May 2, 2024

Install VMware Tools on Linux

Posted on March 2, 2019 by in Blog, Linux


How to install VMware Tools in Debian 9
su

Then, enter the root password
After entering as root successfully, issue the following command:
# apt-get install open-vm-tools open-vm-tools-desktop
Answer “YES” when you will be asked to download the installation files.

A system reboot is needed in order to activate tools but if you cannot do it right now you can go around by issuing the following command:
# vmware-user-suid-wrapper

Manually Install or Upgrade VMware Tools in a Linux Virtual Machine

If a mount point directory does not already exist, create it.
mkdir /mnt/cdrom
(Some Linux distributions use different mount point names. For example, on some distributions the mount point is /media/VMware Tools rather than /mnt/cdrom. Modify the command to reflect the conventions that your distribution uses.)

Mount the CD-ROM drive.
mount /dev/cdrom /mnt/cdrom

Change to a working directory, for example, /tmp.
cd /tmp
tar zxpf /mnt/cdrom/VMwareTools-x.x.x-yyyy.tar.gz
(The value x.x.x is the product version number, and yyyy is the build number of the product release.)

If necessary, unmount the CD-ROM image.
umount /dev/cdrom

Run the installer and configure VMware Tools.
cd vmware-tools-distrib
./vmware-install.pl


Installing Prosper202

Posted on February 24, 2019 by in Blog

Our installer was inspired by the WordPress installer, and we have made it almost exactly the same as theirs. It can generally be installed in about 5 minutes or less by simply uploading the files to a dedicated domain and then running the installer. The following installation guide will help you install Prosper202.

Before you begin the install, there are few things you need to have and do.

 

Things You Need For The Installation

You need access to your site and its directory and software to proceed with the installation.

These are:

  • An access to your web server (via shell or FTP).
  • A text editor.
  • An FTP Client (if you need to install Prosper202 on a remote server).
  • Your web browser of choice.

Begin your installation by:

  1. Checking to ensure that you and your web host has the minimum requirements to run Prosper202.
  2. Download the latest release of Prosper202.
  3. Unzip the downloaded file to a folder on your hard drive.
  4. Print this page out so you have it handy during the installation.

 

 

Sent from Mail for Windows 10

 

What’s the Difference Between Horde, Roundcube and SquirrelMail

Posted on February 24, 2019 by in Blog

What’s the Difference Between Horde, Roundcube and SquirrelMail

Choosing a default Webmail application can be a bit confusing, especially if you do not really know the differences between the applications that cPanel provides. These differences are fairly subtle and the choice generally comes down to your personal preference and what you find useful in a mail client. In this article we will discuss these differences as well as visually illustrate them so that you can make an informed decision without the need to scour the internet for this information.

 

 

Sent from Mail for Windows 10

 

Can you Just Take Extra Procedures to Protect Yourself On Line?

Posted on January 1, 2015 by in Blog

OnlinePrivacy-ThumbnailThere are lots of steps you can take to safeguard yourself on the web. Yet not every person takes enough time to do this. Some only leave everything to fate. What about you? Do you just take additional steps to safeguard your self online?there are many steps you can take to protect yourself on the web. Probably the most apparent means is to install anti-virus and anti-spyware software. It’s not that high priced and may be installed fairly easily. You can install a firewall as another type of protection. It works as a filter to keep undesired information away. Using an anti-spam email supplier can help you stay away from many undesired junk e-mail email messages from coming your path. These are merely several fast options, but they’re choices that folks who will be worried about their privacy typically exercise without question.

It is this a problem of yours? Not everyone feels the worry of their private information becoming stolen on line. They could be very trusting and merely assume it’s going to be fine so long as they don’t do just about anything to create regarding the undesirable interest.

Exactly what camp do you really belong to? Can you simply take additional measures to protect yourself on the web or would you keep it to fate and assume it’s all likely to be fine?

Note: there was a poll embedded inside this post, kindly look at the website to be involved in this post’s poll.

Image Credit: Wikimedia Commons

Even Disconnected Computers May Face Cyberthreats

Posted on December 9, 2013 by in Blog

If your computer is infected with a virus or other forms of malware, disconnecting the machine from the Internet is one of the first steps security experts say you should take. But someday, even physically separating your laptop from a network may not be enough to protect it from cyber evildoers.
German computer scientists have come up with a prototype for building “covert channels” between computers using the machines’ speakers and microphones, potentially defeating high-security measures that rely on placing an “air gap” between computers.
The scientists said their network was based on a system originally designed for underwater communication.
“We adapt the communication system to implement covert and stealthy communications by utilizing the near ultrasonic frequency range,” Michael Hanspach and Michael Goetz, of the Fraunhofer Institute for Communication, Information Processing and Ergonomics, wrote in a paper published in the November issue of the Journal of Communications.
As Dan Goodin explains in Ars Technica:
“The proof-of-concept software — or malicious trojans that adopt the same high-frequency communication methods — could prove especially adept in penetrating highly sensitive environments that routinely place an ‘air gap’ between computers and the outside world. Using nothing more than the built-in microphones and speakers of standard computers, the researchers were able to transmit passwords and other small amounts of data from distances of almost 65 feet. The software can transfer data at much greater distances by employing an acoustical mesh network made up of attacker-controlled devices that repeat the audio signals.”

And such off-network intrusions may be more than theoretical. Ars Technica reported that a mystified security researcher determined his computers, which were unplugged from networks and had their Wi-Fi and Bluetooth cards removed, were infected with malware that used high-frequency transmissions.
The idea of hackers “jumping the air gap” has military officials worried, Geoffrey Ingersoll of Business Insider reported.
“If you take a cybernetic view of what’s happening [in the Navy], right now our approach is unplug it or don’t use a thumb drive,” retired Navy Capt. Mark Hagerott, a cybersecurity professor at the U.S. Naval Academy, said at a recent defense conference. But if hackers “are able to jump the air gap, we are talking about fleets coming to a stop.”
As Ingersoll explained in his post, “Ships would find their targeting software exploited and shut down, possibly even hijacked.”
Hanspach and Goetz, the German scientists, said their concept poses dangers but added that safeguards could be implemented.
“Acoustical networking as a covert communication technology is a considerable threat to computer security,” the scientists wrote in their paper. However, they said such audio snooping could be prevented using “a software-defined lowpass filter” or a “detection guard” that analyzes audio to identify hidden messages.
But to go through the trouble of putting up such countermeasures, computer owners would have to suspect they were being snooped on first.

Intel, HP make for the finish of days — Windows XP’s, which is

Posted on December 4, 2013 by in Blog

As the sun sets on support for Windows XP nears, Hewlett-Packard and Intel executives say they’re looking to new horizons.
In case you’ve been living under a rock, support for Windows XP ends on April 8, 2014.
And Microsoft has a message for you: “If your organization has not started the migration to a modern desktop, you are late,” the company says on its Support Ends Web page.
That has HP and Intel, not surprisingly, giddy with the prospects of upgrades to new hardware.
Here’s what Meg Whitman, HP’s CEO, said earlier this week during the company’s earnings conference call, responding to an analyst’s question.
“So, we’re leading…the migration off of XP. And we actually — I think, Microsoft would probably tell you — we’re among the leaders in terms of spearheading that migration. We’ve been on this for well over a year, and it’s actually going pretty well,” she said.
And Intel’s general manager of the PC Client Group, Kirk Skaugen, speaking the week before, isn’t exactly rueing the day, either.
“Remember, Windows XP [support] end of life is in April so we have confidence that the business refresh which typically comes with a hardware upgrade is heading our way…whether they move to Windows 7 or Windows 8.1 that’s a big change for business,” he said during the company’s investor meeting.”
The operating-system-that-won’t-die has been around since 2001. It got a new lease on life when its successor, Vista, was declared a disaster back in 2006.
There are still plenty of XP users out there, according to an unscientific poll CNET conduced in June.
New November data from Net Applications shows XP stubbornly holding onto a 31 percent desktop market share.
So, you have to wonder, how many of those polled earlier by CNET want to keep utilizing XP? Chances exist are over a limited.
Are they as giddy at the prospects as HP and Intel? We’ll find out on April 8.
New information shows XP carrying about to a big percentage of desktops. Photo by: ( Net Applications)

Free File Compression Software for Windows

Posted on February 21, 2013 by in Blog

damaged archives winrar — Page 1 — FileTraffic.net

Winrar Download

 

[ic_google_search loop=”rand(3-8)” keyword=”Compression Software for Windows”]

[ic_feedzilla keyword=”Compression Software”]

The Windows Mobile Strategy For Microsoft Office 2013

Posted on February 2, 2013 by in Blog

Is Microsoft Office 2013 Working

Microsoft is pinching CIOs by not providing an easy way to run the just released Microsoft Office 2013 except on Windows RT, the operating system for its Surface tablets. With little cross-platform integration, Microsoft is creating an opening for vendors that have a clearer path for a complete mobile workflow.Outlook is the killer app for Microsoft, but the company has not shown any interest in releasing it for Office on the Surface or any other mobile device, said Analyst Esteban Kolsky, Founder of ThinkJar. Instead, Microsoft makes the case for Office365 in the cloud. But so far it only has 20 to 30 percent of the functionality that a customer would get with the desktop version of Microsoft Office. See Sarah Perez’s article for her take on the latest from Office365.

Forrester Research Analyst Phil Karcher said to me in an email that Microsoft does have a complete suite of mobile apps for Windows RT and Windows Phone, but only has Lync and OneNote apps for iOS and Android devices. It has improved browser access to SharePoint 2013, which benefits users on Android and iOS. However, it does not have mobile versions of its core office productivity applications — Word, Excel, PowerPoint on iOS and Android. He sees it as a matter of time before Microsoft opens up more to other platforms.

But Karcher said that competitors have a mixed bag, too:

Google Drive has more editing functionality on Android devices than it does on iOS today. It only introduced editing capabilities for its iOS app in September, and to my understanding only supports docs, not spreadsheets or presentations. IBM Docs has native apps with comprehensive functionality for iOS and Android today, including collaborative document editing from those devices. But a major complaint from users in general is that they want compatibility with their documents formats. Both Google and Android have the advantage of native mobile apps on popular platforms and continue to present alternatives to Microsoft for office productivity in general. But any first mover advantage in mobile support I suspect may be short-lived.

Zoho Evangelist Raju Vegesna said similarly that Windows Phone’s poor market share is a main factor in how Office fares, especially as the desktop recedes in importance:

With Windows Phone share lingering at less than 5 percent and with no iOS and Android versions of Office, users will look for alternatives. Remember, mobile share is going to be more important than desktop marketshare moving forward. Countries like India have 10x more mobile users than desktop users.

I’d love to see Office365 become something important. That would be a shift. The issue for Office comes down to portability. I should be able to open any document, on any device and have an experience that makes the mobile workflow somewhat seamless.

But in truth, not one vendor has the mobile workflow working. It is still a mix of vendors, providing different tools in their various suites. IBM Dominos, for instance, integrates with IBM Traveler, its mobile software for pushing email to mobile devices. IBM Docs integrates OpenSocial, providing a clean web experience. But at least one IBM customer I talked to uses SAP Afaria to manage its mobile devices. That shows the mix that we will continue to see as customers seek out their own workflows for connecting employees and their mobile devices.

Original Page: http://t.co/hjRmxbHu

Genetic info vulnerable to hacking

Posted on January 22, 2013 by in Blog

Personal information securityPersonal genetic information

Using only a computer, a web connection, and publicly accessible online resources, an organization of Whitehead Institute scientists possess been able to identify almost fifty people who got posted private hereditary material as participants in genomic tests.

A Whitehead Institute release files that the team, intent on conducting a workout in “vulnerability analysis – common practice in the field of knowledge safety – took a multi-step approach to show that under certain circumstances, the complete names and identities of genomic studies participants can feel determined, even when their hereditary information is held in databases in de-identified form
“This might be an essential result that points away prospective for breaches of confidentiality in genomics tests,” says Whitehead Fellow , who led the analysis squad. A description of the parties work is published in this days Science mag.

Erlich and colleagues started by analyzing unique hereditary markers recognized as brief tandem repeats on the Y chromosomes (Y-STRs) of men whose genetic information was collected by the heart for the Study of Human Polymorphisms (CEPH) plus whose genomes were sequenced plus developed publically accessible because piece of the 1000 Genomes Show. Mainly because Y chromosome is delivered from dad to son, because are family surnames, there is a robust correlation between surnames along with the DNA found in the Y chromosome.

Recognizing this correlation, genealogists and hereditary genealogy companies have established publically available databases that house Y-STR information by surname. Inside of a task recognised as “surname inference,” the Erlich crew was capable to discover the family labels of the guys by publishing their Y-STRs to these databases. With surnames inside hand, the squad queried extra info resources, including Internet record design engines, obituaries, genealogical sites, plus public demographic information within the National Institute of Average Medical Sciences (NIGMS) Human Genetic Mobile Repository at New Jersey’s Coriell Institute, to acquire practically fifty individuals inside the United States whom were CEPH participants.

The release notes that preceding tests have considered the possibility of genetic identification by coordinating the DNA of the single individual, presuming the person s DNA were cataloged inside 2 individual databases. This function, though, exploits information between faraway paternally-related individuals. As a results, the squad notes which the sharing of hereditary information from one unmarried individual could present deep genealogical ties plus cause the identification of the distantly-related individual whom can do not have acquaintance with the individual that introduced which hereditary information.
“We show

Personal genetic information vulnerable to hacking

if, for example, your Uncle Dave submitted his DNA up to a hereditary genealogy database, we is likely to be diagnosed,” claims Melissa Gymrek, an associate of the Erlich laboratory plus initial author of the Technology product. “In truth, actually a fourth cousin Patrick, whom you ve not found, can determine we when his DNA is within the database, because lengthy because he is paternally linked to we.”

Conscious of the sensitiveness of his work, Erlich emphasizes that he does not have any intention of exposing the labels of those identified, nor does he want to see public sharing of genetic information curtailed.
“Our aim will be better enlighten the current status of identifiability of hereditary data,” he says. “More knowledge empowers participants to weigh the risks and advantages and could make more well-informed decisions when considering whether to talk about their own personal data. We also hope that this study will eventually produce better protection algorithms, better policy tips, and better guidelines to aid mitigate a few of the issues described.”

To that particular end, Erlich revealed his results with officials during the Nationwide Human Genome Research Institute (NHGRI) plus NIGMS before publication. In response, NIGMS plus NHGRI relocated certain demographic info in the publicly-accessible component the NIGMS mobile repository to help minimize the peril of future breaches. Inside the similar problem of Technology inside that the Erlich research appears, Judith H. Greenberg plus Eric D. Green, the Directors of NIGMS plus NHGRI, plus colleagues author a personality about this latest researching inside which they recommend for an examination of approaches to balance analysis participants’ confidentiality liberties with the societal benefits to feel noticed within the sharing of biomedical researching information.

“Yaniv’s work is a timely reminder that in this era in which significant amounts of genomic data are being generated fast and revealed inside the interest of medical advancement, there is definitely an increasing likelihood of privacy breaches,” says Whitehead Institute manager David Page. “In dem delighted that, due to the fact Yaniv’s overture to NIH, you at Whitehead Institute experience the chance to join policymakers at NHGRI plus elsewhere inside what exactly is an important, continuous dialog regarding the worth of safeguarding information, of sharing information, also as the implications of troubles inside either undertaking.”

This work was supported by the Nationwide Defense Technology & Technology Graduate Fellowship, the Edmond J. Safra Centre for Bioinformatics at Tel-Aviv University, and a present from James plus Cathleen Rock.

– Read more in Melissa Gymrek et al., “Identifying Personal Genomes by Surname Inference,” ScienceDOI: 10.1126/science.1229566)
Original Page: http://www.homelandsecuritynewswire.com/dr20130118-personal-genetic-information-vulnerable-to-hacking

The Best Free Remote Access Tools for Windows, Mac

Posted on January 21, 2013 by in Blog

A good remote access tool doesn’t have to cost you a dime. There are plenty of great free tools available, and many of them are downright excellent. In this review, I examine seven quite popular free remote access tools accessible for Windows and, in four situations, Mac consumers. The majority of the complimentary tools indexed here have paid versions that offer extra features (including support for online printing) or licensing (extra host computers or clients). For some users, the paid variation is the just true option.

As you learn about each appliance, you’ll notice that I put a countless focus on remote printing. I count on remote access tools every day, and in most situations I have to be able to pattern to my remote PC. For someone that would like to confirm their home/office email account or view documentation from outside the workplace, all of the the utilities here works fine. But for people trying to acquire some serious work done, remote printing is the contract breaker.